<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>CyberGuard 6 Blog</provider_name><provider_url>https://www.cyberguard6.com/blog</provider_url><title>Detecting Malicious WMI Event Consumers: Event IDs and Threat Actor TTPs</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="Fuidr17FA9"&gt;&lt;a href="https://www.cyberguard6.com/blog/detecting-malicious-wmi-event-consumers/"&gt;Detecting Malicious WMI Event Consumers: Event IDs and Threat Actor TTPs&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.cyberguard6.com/blog/detecting-malicious-wmi-event-consumers/embed/#?secret=Fuidr17FA9" width="600" height="338" title="&#x201C;Detecting Malicious WMI Event Consumers: Event IDs and Threat Actor TTPs&#x201D; &#x2014; CyberGuard 6 Blog" data-secret="Fuidr17FA9" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.cyberguard6.com/blog/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><description>Discover how cyber threat actors abuse WMI for stealthy persistence and execution. Learn to detect malicious WMI event consumers using key Windows Event IDs and security best practices. Stay ahead of threats with expert insights from Cybergyuar 6.</description></oembed>
